[1] |
LI Zhongdao, LIU Yuansheng, CHANG Feixiang, ZHANG Jun, LU Ming.
Research on UWB and LiDAR Fusion Positioning Algorithm in Indoor Environment
[J]. Computer Engineering and Applications, 2021, 57(6): 260-266.
|
[2] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[3] |
ZHAO Yi, GAO Shuping, HE Di.
Eye Movement and Tracking Data Fusion Algorithm Based on Deep Learning
[J]. Computer Engineering and Applications, 2021, 57(10): 211-217.
|
[4] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[5] |
ZHANG Hong, CHENG Chuanqi, XU Zhigang, LI Jianhua.
Survey of Data Fusion Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(24): 1-11.
|
[6] |
CAO Wenwen1, KANG Bin2, YAN Jun1, DING Wan1.
Sparse Representation Target Tracking via Multi-Source Data Fusion
[J]. Computer Engineering and Applications, 2019, 55(6): 1-7.
|
[7] |
QIN Xiaoyan.
Quasi-Truth Degree of First-Order Formula After Using Generalization Rule
[J]. Computer Engineering and Applications, 2019, 55(6): 39-41.
|
[8] |
NING Xinran, XU Yang, CAO Feng, WU Guanfeng.
Clause Elimination Methods in First-Order Logic Lifted from Propositional Logic
[J]. Computer Engineering and Applications, 2019, 55(5): 18-25.
|
[9] |
WU Huihui1, GAO Shuping1, PENG Hongming2, ZHAO Yi1.
Adaptive Fuzzy [C]-Means Clustering Data Fusion Algorithm
[J]. Computer Engineering and Applications, 2019, 55(5): 26-35.
|
[10] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[11] |
WU Xiaoquan1,2, LI Hui1,2, CHEN Mei1,2, DAI Zhenyu1,2.
DRVisSys: visualization recommendation system based on attribute correlation analysis
[J]. Computer Engineering and Applications, 2018, 54(7): 251-256.
|
[12] |
PAN Li1,2, DENG Jia1, WANG Yongli1.
HMM-Cluster: Trajectory clustering for discovering traffic volume overload
[J]. Computer Engineering and Applications, 2018, 54(1): 77-85.
|
[13] |
DUAN Suolin, YANG Ke, MAO Dan, REN Juepeng.
Fuzzy evidence theory-based algorithm in application of fire detection
[J]. Computer Engineering and Applications, 2017, 53(5): 231-235.
|
[14] |
DING Hongfei1,2, QIN Zheng1, LIU Bo1, LI Yanhong1.
Study on urban expressways’ multi-source traffic data fusion technology based on AF-SVR model
[J]. Computer Engineering and Applications, 2017, 53(5): 266-270.
|
[15] |
GE Yongkan, YU Fengqin .
Improved speech synthesis with adaptive postfilter parameters
[J]. Computer Engineering and Applications, 2017, 53(1): 168-171.
|